0 ratings0% found this document useful (0 votes) 71 views12 pagesCyber Security Assignment No. 1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
eats can be anything that can ORE the
tage of vurnuability to breach Security
ne gotively alter erase. harra olejects of
terest»
ask:
his is Se enc term For Sor anre AGE has
‘To malcious purpose . 1 Lat
Se inc\udes Vinus attacks. wore ael ere 3
+r0\00. horses and Spyware. > ur
This as) Emosts prevalont clangex to yous System.
[D)Secusity reach es
this gaou pcof ic ottacks Prete enysattemp
_Prinhege sx elias sito: Sem ence
—ThiSt Ol 07 €sthings Vou abianiots TELS
Goitth Ae term hockiag. Fi
4 |) Des attacks.
Lomneve are designed to prevent ‘egcicna s
locdees® tO “nes Syste -
ee Hixe « Bios}.b Lpyoury website +
; ‘
Sudo, Pieeats =. aidan ane
IeTwo GF 4Ke most _common such
[5) session Hijocking
je These ottacks are rathes than
lond involve on ottackar att enn
FoKe Over O Session.
gE jreaic
4 [-Thiss type of attack CompPromise a
ows Sspoobing
ADNs Spoofing :- DNs stands fr Carma
Nome System). !
[Server So that Users con oe wrediyFile storage aveas
Worms Usually Sloud docdn AM Ctwor Ks
BA virus needs a bost pr0g70M to wuE
WOTMS CoN WA by themselves’ z
13) Trojan horse»
Fats 0 rmaware thot carries oot
i
breration such as playing On online Sam
IB ojon horse varies from a virus be
ihe trojon binds self 40 -non=executabt
Such os imase Files, ond audio files.) 57
4)Ransomusare | - > Fa
Ane dota it contains unt) the -vichms ma
PB Poyment-
~) FRansomevsare encoPpyts data in the Com
Ith A Key tots unknown to the us
fas disPloys unwanted ads and Popa
_ |Ane computer. Pie alana | aged
bow Fat comes dlong with Sor tours c
FAL IAMA/AP OOK AGRSE fF sicllel | opical Gar
te cer elit ovence For the §0i}
I
@-3- Explain various web-attacks? 9 =
> |= web servers hove to allow Communi
JF wersites allow Users +o interiact WOun
SOS ite . nese ee
Any Part of website that allows for
binbero Chon 16 Ol60 imp in web atta
[SThe most common purpase is to for
[server 40 108 the attacker On, even +
lattacker does not have a legitimate suserm
6nd Possword - air cle
WWOr0Uus web attacks Are vor -
oe S8t injection
Cross SCN eHNgG
sIsau anyjecton ¥
ej-dtis attack in which some de
I Jot like Enolish
r [Sac stercs for (Structured Quen langdoge
[there ore Kommonds like Stlect to Get
date -3nsert to Put data and VPOATE to
-beijchange dota. =
username And Password Are Correct.
—The general structure of SOL js Li}
Select column f) Column 2 From jalolé
mae.Example i fi i
Ene noest basic foarosof SOL ‘nj ection Seal
Ho Sulover ti “hin Si Process y cil
lined ea 1S toeredte 6 Store nent Ahot coll!
__olomays be +mier For examples instsadi of putting
_ an actuali username and Pass words Into 0
_oppropriate text fields +he attacker colllsenter
ODM l= ‘4b into the Username and password boxe:
This voll!) coUSe) the lprogromito.g uery Por Create!
sii Biase api all
(Sect +Prom users di AG Oil
Juaner e #sername. =! Orbe yd! ond “Passwords
nee Sox iyse 1889 0
=|Cross Seuss, 2 2 ah
—This attack «is closely ate to SaQLinjecton .
= 14 tewolves entering datd jother 4han cohat wes
intended: andi it depends) om thes coebeipyograroner|
bot Filtering aneute z
_The preret ator Finds some area: obcaebsite
thot. alles user +o type sionthe sexrthat other!
users udii See Ada then: instead dnjets client-
side scmapt di mhotthhose Piclds aceies boll
To beter understond +nis Process, See one
| SogMamMensleH1S ASSume that AQConiiine book
‘gales thasualto gs i161 ins odd HOMES hopRing
Users candhave Accounys) Wit) or edit @ords
stoveda ROSH eV Leuosvand moter sell 4
ETneaktacker first setup on otdeuaicayes eeTen Ane CXLarken Goes 40 4he Teal ABC
beck soles websije and finds a mathe
oh Bole: HE Goos tO the Teviews SOCHOh
eso ot ZwWindor Joca-tion = htLp + /Mowovo
Pcors' <2 /seript >
= JENow cohen Users go to thot book
iW eediret themito the Pare Site mona
: KS AO ATeot deol like the Teal one.
W-the ottocker When can have +he webs
2)\ the user hat his session has +i
na to Please login again. ae
[trot Goould alloca tne attackay 40 Bathe
Jef accounts and Posswordsy a & Eee
igi age eer? "
O24 boride” a short hote Sb DNS Poisning-
= Ss stonds fr (Domain Nome systens)Sen
Se is also coljed as OwS Spoofing. aay
SONS Poisning oF PWS Spooling jis (one
ity to Steal) their access. epee,
pes Woh Sensitive information.
e Malcious website 1S phen lDpteinvin bec
- Tr ein eycepinon,
and a DWS
di Per emtumal
i - =
192
0 Awd) (aDewohite hat hackaers
HA wohite hot hackers Sometimes GEMS
orc ING »
They ave ontesis of black hot ho K
They expiocits Computer systems
idenhfy their secumty flocd go he
aise Tecormmendations fox imprveme
Block [hot hacwers : Z
black hat hockey is the person
he might steo\ dotaerase Files or defa
Grey hat hackers jsillegal activities,
B34 1S an hocker an _indivdual sho”- © |Scvipt Kiddes ran tt ome eee. a
[packer is On expert in @ Given SNStefn.
|+ deovicludes its shores of frauds oe
Tne cost common teem forithis isgSert of
__| Person sis somply kiddy (Raympe0d 1.98 3) de 5
Dats rmportoot to remenbew +hot nob [dud
evel hackers inisempt Kiddes su 56! vege
These \nclucdes Passwardsattack togis ond
denoial of Seyuiceudttoic hi tools tages ag
ESemipt kidde is dermeaniogaemnn uéed todesiibe |
Dowice hadwers! Who Use Sxishogeenpks ond |
Softuove fo Corry Out quberotboacks: Gia)”
2 CUber_-scourity/statatics show hat Mere ove
[around 2200 cyber attocks: Penday 9
~As dhe term Script kiddes diso Known a5 skidd_
2S Utilize prewritten Seripts Gnd software +o
Icom out Anelr Iacking endeavours.
_sChorotevistics of Script Kidde:
D Tnexpirienced
Dandiserveet
| DReckless
4) dmpu)sive
S)Rttenvon seeking
Were ave Some exompies script Kiddes:
elosite defacement
5 ottacks E
cial Enaineaning Ottacks f
i 965 oe Phishing attacks. | ra
_ {éiribute mo\Ware - ri |
aIPATea king ‘
fat defines os the action of Using
jjyous Ond, Mostly ANega\ 90.5 1 Order
LIPON Tox some Sort of telecommunicat
bi \\ vordér, tronsfer Jor ovher service.
HPhreakiog requires o rather sign
Know ladge of AeJeconmmunications
=Many Phreokers have Some Professional
SxPi merce working for a plone compony
pOtner selecommuni cation business. 2a)
FOne speciality sof hacking involves break
i
2/2 This SUbSspeciayity of Heccued 1S oa
OS sphretiing « yey i
into telephone systers